[Free] 2017(Sep) EnsurePass Braindumps GIAC GSLC Dumps with VCE and PDF 291-300

EnsurePass
2017 Sep GIAC Official New Released GSLC
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GSLC.html

GIAC Security Leadership Certification (GSLC)

Question No: 291 – (Topic 3)

How can you calculate the Annualized Loss Expectancy (ALE) that may occur due to a threat?

  1. Single Loss Expectancy (SLE) X Annualized Rate of Occurrence (ARO)

  2. Single Loss Expectancy (SLE)/ Exposure Factor (EF)

  3. Asset Value X Exposure Factor (EF)

  4. Exposure Factor (EF)/Single Loss Expectancy (SLE)

Answer: A

Question No: 292 – (Topic 3)

You are the program manager of the JNH Program. Tom, a project manager in your program, has just completed his project and is ready to officially close his project. You agree that Tom#39;s project is completed. What role do you play in Tom#39;s project closure?

  1. You must ensure that that the projects within the program have been closed at the project level.

  2. You must ensure that the project sponsor closes the project.

  3. You must ensure that the program management team closes the project for the project manager.

  4. You must close the project before operations closes the project.

Answer: A

Question No: 293 – (Topic 3)

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company#39;s headquarters is located at Los Angeles. A branch office of the company is located at Denver. You are about to send a message to Rick who is a Network Administrator at Denver. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys will you use to encrypt the message?

  1. The recipient#39;s public key

  2. Your private key

  3. The recipient#39;s private key

  4. Your public key

Answer: A

Question No: 294 – (Topic 3)

You check the logs on several clients and find that there is traffic coming in on an odd port (port 1872). All clients have the Windows XP firewall turned on. What should you do to block this unwanted traffic?

  1. Trace back that traffic and find its origin.

  2. Check the exceptions in the firewall and unselect that port exception.

  3. Perform a virus scan to find the virus responsible for this traffic.

  4. Shut down the service that connects to that port.

Answer: B

Question No: 295 – (Topic 3)

What course of action can be taken by a party if the current negotiations fail and an agreement cannot be reached?

  1. BATNA

  2. Bias

  3. ZOPA

  4. PON

Answer: A

Question No: 296 – (Topic 3)

Which of the following are based on malicious code?

Each correct answer represents a complete solution. Choose two.

  1. Trojan horse

  2. Worm

  3. Biometrics

  4. Denial-of-Service (DoS)

Answer: A,B

Question No: 297 – (Topic 3)

You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?

  1. Network anti-spyware software

  2. Protocol analyzers

  3. Network anti-virus software

  4. Site surveys

Answer: D

Question No: 298 – (Topic 3)

Which of the following tools can be used for steganography?

Each correct answer represents a complete solution. Choose all that apply.

  1. Anti-x

  2. Snow.exe

  3. Image hide

  4. Stegbreak

Answer: B,C

Question No: 299 – (Topic 3)

Which of the following exists between the client and the server system to provide security and allows customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application layer protocols?

  1. Application-level gateway

  2. Proxy server

  3. Firewall

  4. DMZ

Answer: A

Question No: 300 – (Topic 3)

You are the Network Administrator for a company that does a large amount of defense contract business.

A high level of security, particularly regarding sensitive documents, is required. Which of the following steps will you take to secure network printers?

Each correct answer represents a complete solution. Choose two.

  1. Remove the printers from the network and not allow remote printing.

  2. Ensure that the printers hard drive is scanned for spyware.

  3. Secure all remote administrative protocols such as telnet.

  4. Limit the size of print jobs on the printer.

  5. Do not allow duplicate print jobs.

Answer: B,C

100% Free Download!
Download Free Demo:GSLC Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GSLC Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE